CVE-2026-5331
Path Traversal in OpenCart 4.1.0.3 Extension Installer (Remote
Publication date: 2026-04-02
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opencart | opencart | 4.1.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenCart version 4.1.0.3, specifically in the installer.php file of the Extension Installer Page component. It allows an attacker to perform a path traversal attack by manipulating input, which can be exploited remotely.
Path traversal vulnerabilities enable attackers to access files and directories that are outside the intended directory, potentially leading to unauthorized file access or modification.
The exploit for this vulnerability has been publicly disclosed, and the vendor did not respond to early notifications about it.
How can this vulnerability impact me? :
Exploiting this vulnerability can lead to unauthorized access to files on the server, potentially allowing an attacker to write arbitrary files or execute remote code.
This can compromise the integrity and confidentiality of the system, leading to data breaches, service disruption, or full system compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the vulnerability in OpenCart 4.1.0.3 affects compliance with common standards and regulations such as GDPR or HIPAA.